Enhanced Chaotic Map Based Key Agreement to Mitigate Packet Dropping Attack from MANETs

International Journal of Electronics and Communication Engineering
© 2023 by SSRG - IJECE Journal
Volume 10 Issue 7
Year of Publication : 2023
Authors : S. Syed Abdul Syed, C. Atheeq, A. Abdul Azeez Khan, K. Javubar Sathick, E. Syed Mohamed, C. Altaf
pdf
How to Cite?

S. Syed Abdul Syed, C. Atheeq, A. Abdul Azeez Khan, K. Javubar Sathick, E. Syed Mohamed, C. Altaf, "Enhanced Chaotic Map Based Key Agreement to Mitigate Packet Dropping Attack from MANETs," SSRG International Journal of Electronics and Communication Engineering, vol. 10,  no. 7, pp. 23-32, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I7P103

Abstract:

MANET is a self-organized wireless network with no infrastructure. Especially data transfer from one system to another needs to be done securely. To provide data integrity, authentication plays a vital role in data communication. RSA and ECC are widely used algorithms in the real world, but authentication using these algorithms is time-consuming. Towards this, various algorithms came into existence with different security primitives. However, studying the critical agreement process among these security mechanisms is important. We have studied the patents related to secure end-to-end communication in MANET. Therefore, we aim to design a chaos-based mutual authentication algorithm that takes less time than these existing algorithms and evaluate concerning attack Resilience, packet delivery fraction, delay, throughput, and overhead. Simulation results show the result of the proposed mechanism and give better performance in terms of the said parameters. Comparison of the proposed system presents better results when compared to RSA ECC in terms of key generation mechanism.

Keywords:

MANET, Security, Authentication, Chaos, Hash, Key, RSA, ECC.

References:

[1] Xiang Shihu, and Yang Jun, “Performance Reliability Evaluation for Mobile Ad Hoc Networks,” Reliability Engineering & System Safety, vol. 169, pp. 32-39, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Wu Di et al., “Equilibrium Analysis of Bitcoin Block Withholding Attack: A Generalized Model,” Reliability Engineering & System Safety, vol. 185, pp. 318-328, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Annie Ezhilarasi M, and Parthasarathy P, “Detection Algorithms of the Wormhole Attacks in MANET,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 7, pp. 26-29, 2017.
[Publisher Link]
[4] Shraddha Kamble, B. K. Mishra, and Rajesh Bansode, “Detection of Routing Misbehaving Links in MANET by Advance EAACK Scheme,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 6, no. 3, pp. 1-5, 2016.
[CrossRef] [Publisher Link]
[5] Neeraj Kumar Jarouliya, and Nirupama Tiwari, “Utilization of Particle Swarm Optimization (PSO) Use as Clustering Algorithm in MANET,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 10-14, 2019.
[CrossRef] [Publisher Link]
[6] R. Rajesh, “An Identity-Based Key Management in MANET with Threshold Sharing,” SSRG International Journal of Mobile Computing and Application, vol. 4, no. 2, pp. 8-12, 2017.
[CrossRef] [Publisher Link]
[7] R. Rajesh, “A Novel Security Approach in MANET with Certificateless Cryptography,” SSRG International Journal of Computer Science and Engineering, vol. 4, no. 4, pp. 5-12, 2017.
[CrossRef] [Publisher Link]
[8] Anugraha, and Krishnaveni, “An Efficient and Secure Routing in MANET using Trust Model,” International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 330-336, 2022.
[CrossRef] [Publisher Link]
[9] Zeba Naaz, Kauser Fatima, and C. Atheeq, “Performance-Based Comparison Study of RSA and Chaotic Maps in MANET,” SSRG International Journal of Electrical and Electronics Engineering, vol. 4, no. 2, pp. 17-22, 2017.
[CrossRef] [Publisher Link]
[10] Nicholas Jansma, and Brandon Arrendondo, “Performance Comparison of an Elliptic Curve and RSA Digital Signatures,” Efficiency Comparison of an Elliptic Curve and RSA Digital Signatures, pp. 1-20, 2004.
[Google Scholar] [Publisher Link]
[11] S. A Vanstone, “Next Generation Security for Wireless: Elliptic Curve Cryptography,” Computers and Security, vol. 22, no. 5, pp. 412-415, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Ruchika Markan, and Gurvinder Kaur, “Literature Survey on Elliptic Curve Encryption Techniques,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 9, 2013.
[Google Scholar]
[13] Akash Singh et al., “Security and Trust Management in MANET,” Information Technology and Mobile Communication, New York: Springer-Verlag, vol. 147. pp. 384-387, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Antonio Tedeschi et al., “Statistically-Enhancing Diagnosis of Packet Loss in WSNs,” International Journal of Mobile Network Design and Innovation, vol. 7, no. 1, pp. 3-14, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] C. Atheeq, and M. Munir Ahmed Rabbani, “Secure Intelligence Algorithm for Data Transmission in Integrated Internet MANET,” International Journal of Computer Science and Applications, vol. 14, no. 2, pp. 142-163, 2017.
[Google Scholar] [Publisher Link]
[16] I-En Liao, Cheng-Chi Lee, and Min-Shiang Hwang, “A Password Authentication Scheme over Insecure Networks,” Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Zygmunt Haas, and Panagiotis Papadimitratos, Secure End-To-End Communication in Mobile Ad Hoc Networks, United States Patent Application, 2003.
[Google Scholar] [Publisher Link]
[18] S. Syed Abdul Syed, and T. Senthil Kumaran, “FCM Based Segmentation for Medical Images,” Research Journal of Pharmacy and Technology, vol. 10, no. 12, pp. 4350-4352, 2017.
[CrossRef] [Publisher Link]
[19] Nikhat Naaz Aslam Shaikh, and Vaishali Bagade, “Performance Evaluation and Detection of Grey, Warm, Flooding, Misrouting & Modification of Attacks in Vanet,” SSRG International Journal of Electronics and Communication Engineering, vol. 8, no. 4, pp. 10- 17, 2021.
[CrossRef] [Publisher Link]
[20] C. Atheeq, and M. Munir Ahmed Rabbani, “Mutually Authenticated Key Agreement Protocol Based on Chaos Theory Integrating Internet and MANET,” International Journal of Computer Applications in Technology, vol. 56, no. 4, pp. 309-318, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[21] S. K. Hazul Islam, and G. P. Biswas, “An Improved Pairing-Free Identity-Based Authenticated Key Agreement Protocol Based on ECC,” Procedia Engineering, vol. 30, pp. 499-507, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Simon Blake-Wilson, Don Johnson, and Alfred Menezes, “Key Agreement Protocols and their Security Analysis,” Cryptography and Coding, pp. 30-45, 1997.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Y. V. S. Sai Pragathi, and S. P. Setty, “Design and Implementation of Secure LAR Routing Protocol in MANETs,” International Journal of Computer & Organization Trends (IJCOT), vol. 6, no. 4, pp. 1-3, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[24] P. G. V. Suresh Kumar, “Implementation of MAODV and Tree Maintenance in Overlay Multicasting Protocol for MANETs,” International Journal of Computer & Organization Trends (IJCOT), vol. 24, no. 1, pp. 24-28, 2015.
[Publisher Link]
[25] R. Navinkumar, and N. Prabaharan, “Improve Routing Process with Feature Based Packet Transmission Technique in MANET using GRBR Algorithm,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 6, no. 2, pp. 1-11, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Sebastian Terence, Jude Immaculate, and P. Geethanjali, “Survey on Packet Dropping Detection Techniques in Wireless Sensor Network,” International Journal of Engineering Trends and Technology, vol. 71, no. 6, pp. 259-273, 2023.
[CrossRef] [Publisher Link]
[27] C. Atheeq, and M. Munir A Rabbani, “CACK-A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs,” Recent Advances in Computer Science and Communication, vol. 14, no. 3, pp. 837-847, 2021.
[CrossRef] [Google Scholar] [Publisher Link]